| /* |
| BNEP implementation for Linux Bluetooth stack (BlueZ). |
| Copyright (C) 2001-2002 Inventel Systemes |
| Written 2001-2002 by |
| Clément Moreau <clement.moreau@inventel.fr> |
| David Libault <david.libault@inventel.fr> |
| |
| Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com> |
| |
| This program is free software; you can redistribute it and/or modify |
| it under the terms of the GNU General Public License version 2 as |
| published by the Free Software Foundation; |
| |
| THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
| OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
| FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. |
| IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY |
| CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES |
| WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
| ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| |
| ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, |
| COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS |
| SOFTWARE IS DISCLAIMED. |
| */ |
| |
| #include <linux/module.h> |
| #include <linux/kthread.h> |
| #include <linux/file.h> |
| #include <linux/etherdevice.h> |
| #include <linux/unaligned.h> |
| |
| #include <net/bluetooth/bluetooth.h> |
| #include <net/bluetooth/l2cap.h> |
| #include <net/bluetooth/hci_core.h> |
| |
| #include "bnep.h" |
| |
| #define VERSION "1.3" |
| |
| static bool compress_src = true; |
| static bool compress_dst = true; |
| |
| static LIST_HEAD(bnep_session_list); |
| static DECLARE_RWSEM(bnep_session_sem); |
| |
| static struct bnep_session *__bnep_get_session(u8 *dst) |
| { |
| struct bnep_session *s; |
| |
| BT_DBG(""); |
| |
| list_for_each_entry(s, &bnep_session_list, list) |
| if (ether_addr_equal(dst, s->eh.h_source)) |
| return s; |
| |
| return NULL; |
| } |
| |
| static void __bnep_link_session(struct bnep_session *s) |
| { |
| list_add(&s->list, &bnep_session_list); |
| } |
| |
| static void __bnep_unlink_session(struct bnep_session *s) |
| { |
| list_del(&s->list); |
| } |
| |
| static int bnep_send(struct bnep_session *s, void *data, size_t len) |
| { |
| struct socket *sock = s->sock; |
| struct kvec iv = { data, len }; |
| |
| return kernel_sendmsg(sock, &s->msg, &iv, 1, len); |
| } |
| |
| static int bnep_send_rsp(struct bnep_session *s, u8 ctrl, u16 resp) |
| { |
| struct bnep_control_rsp rsp; |
| rsp.type = BNEP_CONTROL; |
| rsp.ctrl = ctrl; |
| rsp.resp = htons(resp); |
| return bnep_send(s, &rsp, sizeof(rsp)); |
| } |
| |
| #ifdef CONFIG_BT_BNEP_PROTO_FILTER |
| static inline void bnep_set_default_proto_filter(struct bnep_session *s) |
| { |
| /* (IPv4, ARP) */ |
| s->proto_filter[0].start = ETH_P_IP; |
| s->proto_filter[0].end = ETH_P_ARP; |
| /* (RARP, AppleTalk) */ |
| s->proto_filter[1].start = ETH_P_RARP; |
| s->proto_filter[1].end = ETH_P_AARP; |
| /* (IPX, IPv6) */ |
| s->proto_filter[2].start = ETH_P_IPX; |
| s->proto_filter[2].end = ETH_P_IPV6; |
| } |
| #endif |
| |
| static int bnep_ctrl_set_netfilter(struct bnep_session *s, __be16 *data, int len) |
| { |
| int n; |
| |
| if (len < 2) |
| return -EILSEQ; |
| |
| n = get_unaligned_be16(data); |
| data++; |
| len -= 2; |
| |
| if (len < n) |
| return -EILSEQ; |
| |
| BT_DBG("filter len %d", n); |
| |
| #ifdef CONFIG_BT_BNEP_PROTO_FILTER |
| n /= 4; |
| if (n <= BNEP_MAX_PROTO_FILTERS) { |
| struct bnep_proto_filter *f = s->proto_filter; |
| int i; |
| |
| for (i = 0; i < n; i++) { |
| f[i].start = get_unaligned_be16(data++); |
| f[i].end = get_unaligned_be16(data++); |
| |
| BT_DBG("proto filter start %u end %u", |
| f[i].start, f[i].end); |
| } |
| |
| if (i < BNEP_MAX_PROTO_FILTERS) |
| memset(f + i, 0, sizeof(*f)); |
| |
| if (n == 0) |
| bnep_set_default_proto_filter(s); |
| |
| bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_SUCCESS); |
| } else { |
| bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_LIMIT_REACHED); |
| } |
| #else |
| bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_UNSUPPORTED_REQ); |
| #endif |
| return 0; |
| } |
| |
| static int bnep_ctrl_set_mcfilter(struct bnep_session *s, u8 *data, int len) |
| { |
| int n; |
| |
| if (len < 2) |
| return -EILSEQ; |
| |
| n = get_unaligned_be16(data); |
| data += 2; |
| len -= 2; |
| |
| if (len < n) |
| return -EILSEQ; |
| |
| BT_DBG("filter len %d", n); |
| |
| #ifdef CONFIG_BT_BNEP_MC_FILTER |
| n /= (ETH_ALEN * 2); |
| |
| if (n > 0) { |
| int i; |
| |
| s->mc_filter = 0; |
| |
| /* Always send broadcast */ |
| set_bit(bnep_mc_hash(s->dev->broadcast), (ulong *) &s->mc_filter); |
| |
| /* Add address ranges to the multicast hash */ |
| for (; n > 0; n--) { |
| u8 a1[6], *a2; |
| |
| memcpy(a1, data, ETH_ALEN); |
| data += ETH_ALEN; |
| a2 = data; |
| data += ETH_ALEN; |
| |
| BT_DBG("mc filter %pMR -> %pMR", a1, a2); |
| |
| /* Iterate from a1 to a2 */ |
| set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter); |
| while (memcmp(a1, a2, 6) < 0 && s->mc_filter != ~0LL) { |
| /* Increment a1 */ |
| i = 5; |
| while (i >= 0 && ++a1[i--] == 0) |
| ; |
| |
| set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter); |
| } |
| } |
| } |
| |
| BT_DBG("mc filter hash 0x%llx", s->mc_filter); |
| |
| bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_SUCCESS); |
| #else |
| bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_FILTER_UNSUPPORTED_REQ); |
| #endif |
| return 0; |
| } |
| |
| static int bnep_rx_control(struct bnep_session *s, void *data, int len) |
| { |
| u8 cmd = *(u8 *)data; |
| int err = 0; |
| |
| data++; |
| len--; |
| |
| switch (cmd) { |
| case BNEP_CMD_NOT_UNDERSTOOD: |
| case BNEP_SETUP_CONN_RSP: |
| case BNEP_FILTER_NET_TYPE_RSP: |
| case BNEP_FILTER_MULTI_ADDR_RSP: |
| /* Ignore these for now */ |
| break; |
| |
| case BNEP_FILTER_NET_TYPE_SET: |
| err = bnep_ctrl_set_netfilter(s, data, len); |
| break; |
| |
| case BNEP_FILTER_MULTI_ADDR_SET: |
| err = bnep_ctrl_set_mcfilter(s, data, len); |
| break; |
| |
| case BNEP_SETUP_CONN_REQ: |
| /* Successful response should be sent only once */ |
| if (test_bit(BNEP_SETUP_RESPONSE, &s->flags) && |
| !test_and_set_bit(BNEP_SETUP_RSP_SENT, &s->flags)) |
| err = bnep_send_rsp(s, BNEP_SETUP_CONN_RSP, |
| BNEP_SUCCESS); |
| else |
| err = bnep_send_rsp(s, BNEP_SETUP_CONN_RSP, |
| BNEP_CONN_NOT_ALLOWED); |
| break; |
| |
| default: { |
| u8 pkt[3]; |
| pkt[0] = BNEP_CONTROL; |
| pkt[1] = BNEP_CMD_NOT_UNDERSTOOD; |
| pkt[2] = cmd; |
| err = bnep_send(s, pkt, sizeof(pkt)); |
| } |
| break; |
| } |
| |
| return err; |
| } |
| |
| static int bnep_rx_extension(struct bnep_session *s, struct sk_buff *skb) |
| { |
| struct bnep_ext_hdr *h; |
| int err = 0; |
| |
| do { |
| h = (void *) skb->data; |
| if (!skb_pull(skb, sizeof(*h))) { |
| err = -EILSEQ; |
| break; |
| } |
| |
| BT_DBG("type 0x%x len %u", h->type, h->len); |
| |
| switch (h->type & BNEP_TYPE_MASK) { |
| case BNEP_EXT_CONTROL: |
| bnep_rx_control(s, skb->data, skb->len); |
| break; |
| |
| default: |
| /* Unknown extension, skip it. */ |
| break; |
| } |
| |
| if (!skb_pull(skb, h->len)) { |
| err = -EILSEQ; |
| break; |
| } |
| } while (!err && (h->type & BNEP_EXT_HEADER)); |
| |
| return err; |
| } |
| |
| static u8 __bnep_rx_hlen[] = { |
| ETH_HLEN, /* BNEP_GENERAL */ |
| 0, /* BNEP_CONTROL */ |
| 2, /* BNEP_COMPRESSED */ |
| ETH_ALEN + 2, /* BNEP_COMPRESSED_SRC_ONLY */ |
| ETH_ALEN + 2 /* BNEP_COMPRESSED_DST_ONLY */ |
| }; |
| |
| static int bnep_rx_frame(struct bnep_session *s, struct sk_buff *skb) |
| { |
| struct net_device *dev = s->dev; |
| struct sk_buff *nskb; |
| u8 type, ctrl_type; |
| |
| dev->stats.rx_bytes += skb->len; |
| |
| type = *(u8 *) skb->data; |
| skb_pull(skb, 1); |
| ctrl_type = *(u8 *)skb->data; |
| |
| if ((type & BNEP_TYPE_MASK) >= sizeof(__bnep_rx_hlen)) |
| goto badframe; |
| |
| if ((type & BNEP_TYPE_MASK) == BNEP_CONTROL) { |
| if (bnep_rx_control(s, skb->data, skb->len) < 0) { |
| dev->stats.tx_errors++; |
| kfree_skb(skb); |
| return 0; |
| } |
| |
| if (!(type & BNEP_EXT_HEADER)) { |
| kfree_skb(skb); |
| return 0; |
| } |
| |
| /* Verify and pull ctrl message since it's already processed */ |
| switch (ctrl_type) { |
| case BNEP_SETUP_CONN_REQ: |
| /* Pull: ctrl type (1 b), len (1 b), data (len bytes) */ |
| if (!skb_pull(skb, 2 + *(u8 *)(skb->data + 1) * 2)) |
| goto badframe; |
| break; |
| case BNEP_FILTER_MULTI_ADDR_SET: |
| case BNEP_FILTER_NET_TYPE_SET: |
| /* Pull: ctrl type (1 b), len (2 b), data (len bytes) */ |
| if (!skb_pull(skb, 3 + *(u16 *)(skb->data + 1) * 2)) |
| goto badframe; |
| break; |
| default: |
| kfree_skb(skb); |
| return 0; |
| } |
| } else { |
| skb_reset_mac_header(skb); |
| |
| /* Verify and pull out header */ |
| if (!skb_pull(skb, __bnep_rx_hlen[type & BNEP_TYPE_MASK])) |
| goto badframe; |
| |
| s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2)); |
| } |
| |
| if (type & BNEP_EXT_HEADER) { |
| if (bnep_rx_extension(s, skb) < 0) |
| goto badframe; |
| } |
| |
| /* Strip 802.1p header */ |
| if (ntohs(s->eh.h_proto) == ETH_P_8021Q) { |
| if (!skb_pull(skb, 4)) |
| goto badframe; |
| s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2)); |
| } |
| |
| /* We have to alloc new skb and copy data here :(. Because original skb |
| * may not be modified and because of the alignment requirements. */ |
| nskb = alloc_skb(2 + ETH_HLEN + skb->len, GFP_KERNEL); |
| if (!nskb) { |
| dev->stats.rx_dropped++; |
| kfree_skb(skb); |
| return -ENOMEM; |
| } |
| skb_reserve(nskb, 2); |
| |
| /* Decompress header and construct ether frame */ |
| switch (type & BNEP_TYPE_MASK) { |
| case BNEP_COMPRESSED: |
| __skb_put_data(nskb, &s->eh, ETH_HLEN); |
| break; |
| |
| case BNEP_COMPRESSED_SRC_ONLY: |
| __skb_put_data(nskb, s->eh.h_dest, ETH_ALEN); |
| __skb_put_data(nskb, skb_mac_header(skb), ETH_ALEN); |
| put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2)); |
| break; |
| |
| case BNEP_COMPRESSED_DST_ONLY: |
| __skb_put_data(nskb, skb_mac_header(skb), ETH_ALEN); |
| __skb_put_data(nskb, s->eh.h_source, ETH_ALEN); |
| put_unaligned(s->eh.h_proto, (__be16 *)__skb_put(nskb, 2)); |
| break; |
| |
| case BNEP_GENERAL: |
| __skb_put_data(nskb, skb_mac_header(skb), ETH_ALEN * 2); |
| put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2)); |
| break; |
| } |
| |
| skb_copy_from_linear_data(skb, __skb_put(nskb, skb->len), skb->len); |
| kfree_skb(skb); |
| |
| dev->stats.rx_packets++; |
| nskb->ip_summed = CHECKSUM_NONE; |
| nskb->protocol = eth_type_trans(nskb, dev); |
| netif_rx(nskb); |
| return 0; |
| |
| badframe: |
| dev->stats.rx_errors++; |
| kfree_skb(skb); |
| return 0; |
| } |
| |
| static u8 __bnep_tx_types[] = { |
| BNEP_GENERAL, |
| BNEP_COMPRESSED_SRC_ONLY, |
| BNEP_COMPRESSED_DST_ONLY, |
| BNEP_COMPRESSED |
| }; |
| |
| static int bnep_tx_frame(struct bnep_session *s, struct sk_buff *skb) |
| { |
| struct ethhdr *eh = (void *) skb->data; |
| struct socket *sock = s->sock; |
| struct kvec iv[3]; |
| int len = 0, il = 0; |
| u8 type = 0; |
| |
| BT_DBG("skb %p dev %p type %u", skb, skb->dev, skb->pkt_type); |
| |
| if (!skb->dev) { |
| /* Control frame sent by us */ |
| goto send; |
| } |
| |
| iv[il++] = (struct kvec) { &type, 1 }; |
| len++; |
| |
| if (compress_src && ether_addr_equal(eh->h_dest, s->eh.h_source)) |
| type |= 0x01; |
| |
| if (compress_dst && ether_addr_equal(eh->h_source, s->eh.h_dest)) |
| type |= 0x02; |
| |
| if (type) |
| skb_pull(skb, ETH_ALEN * 2); |
| |
| type = __bnep_tx_types[type]; |
| switch (type) { |
| case BNEP_COMPRESSED_SRC_ONLY: |
| iv[il++] = (struct kvec) { eh->h_source, ETH_ALEN }; |
| len += ETH_ALEN; |
| break; |
| |
| case BNEP_COMPRESSED_DST_ONLY: |
| iv[il++] = (struct kvec) { eh->h_dest, ETH_ALEN }; |
| len += ETH_ALEN; |
| break; |
| } |
| |
| send: |
| iv[il++] = (struct kvec) { skb->data, skb->len }; |
| len += skb->len; |
| |
| /* FIXME: linearize skb */ |
| { |
| len = kernel_sendmsg(sock, &s->msg, iv, il, len); |
| } |
| kfree_skb(skb); |
| |
| if (len > 0) { |
| s->dev->stats.tx_bytes += len; |
| s->dev->stats.tx_packets++; |
| return 0; |
| } |
| |
| return len; |
| } |
| |
| static int bnep_session(void *arg) |
| { |
| struct bnep_session *s = arg; |
| struct net_device *dev = s->dev; |
| struct sock *sk = s->sock->sk; |
| struct sk_buff *skb; |
| DEFINE_WAIT_FUNC(wait, woken_wake_function); |
| |
| BT_DBG(""); |
| |
| set_user_nice(current, -15); |
| |
| add_wait_queue(sk_sleep(sk), &wait); |
| while (1) { |
| if (atomic_read(&s->terminate)) |
| break; |
| /* RX */ |
| while ((skb = skb_dequeue(&sk->sk_receive_queue))) { |
| skb_orphan(skb); |
| if (!skb_linearize(skb)) |
| bnep_rx_frame(s, skb); |
| else |
| kfree_skb(skb); |
| } |
| |
| if (sk->sk_state != BT_CONNECTED) |
| break; |
| |
| /* TX */ |
| while ((skb = skb_dequeue(&sk->sk_write_queue))) |
| if (bnep_tx_frame(s, skb)) |
| break; |
| netif_wake_queue(dev); |
| |
| /* |
| * wait_woken() performs the necessary memory barriers |
| * for us; see the header comment for this primitive. |
| */ |
| wait_woken(&wait, TASK_INTERRUPTIBLE, MAX_SCHEDULE_TIMEOUT); |
| } |
| remove_wait_queue(sk_sleep(sk), &wait); |
| |
| /* Cleanup session */ |
| down_write(&bnep_session_sem); |
| |
| /* Delete network device */ |
| unregister_netdev(dev); |
| |
| /* Wakeup user-space polling for socket errors */ |
| s->sock->sk->sk_err = EUNATCH; |
| |
| wake_up_interruptible(sk_sleep(s->sock->sk)); |
| |
| /* Release the socket */ |
| fput(s->sock->file); |
| |
| __bnep_unlink_session(s); |
| |
| up_write(&bnep_session_sem); |
| free_netdev(dev); |
| module_put_and_kthread_exit(0); |
| return 0; |
| } |
| |
| static struct device *bnep_get_device(struct bnep_session *session) |
| { |
| struct l2cap_conn *conn = l2cap_pi(session->sock->sk)->chan->conn; |
| |
| if (!conn || !conn->hcon) |
| return NULL; |
| |
| return &conn->hcon->dev; |
| } |
| |
| static const struct device_type bnep_type = { |
| .name = "bluetooth", |
| }; |
| |
| int bnep_add_connection(struct bnep_connadd_req *req, struct socket *sock) |
| { |
| u32 valid_flags = BIT(BNEP_SETUP_RESPONSE); |
| struct net_device *dev; |
| struct bnep_session *s, *ss; |
| u8 dst[ETH_ALEN], src[ETH_ALEN]; |
| int err; |
| |
| BT_DBG(""); |
| |
| if (!l2cap_is_socket(sock)) |
| return -EBADFD; |
| |
| if (req->flags & ~valid_flags) |
| return -EINVAL; |
| |
| baswap((void *) dst, &l2cap_pi(sock->sk)->chan->dst); |
| baswap((void *) src, &l2cap_pi(sock->sk)->chan->src); |
| |
| /* session struct allocated as private part of net_device */ |
| dev = alloc_netdev(sizeof(struct bnep_session), |
| (*req->device) ? req->device : "bnep%d", |
| NET_NAME_UNKNOWN, |
| bnep_net_setup); |
| if (!dev) |
| return -ENOMEM; |
| |
| down_write(&bnep_session_sem); |
| |
| ss = __bnep_get_session(dst); |
| if (ss && ss->state == BT_CONNECTED) { |
| err = -EEXIST; |
| goto failed; |
| } |
| |
| s = netdev_priv(dev); |
| |
| /* This is rx header therefore addresses are swapped. |
| * ie. eh.h_dest is our local address. */ |
| memcpy(s->eh.h_dest, &src, ETH_ALEN); |
| memcpy(s->eh.h_source, &dst, ETH_ALEN); |
| eth_hw_addr_set(dev, s->eh.h_dest); |
| |
| s->dev = dev; |
| s->sock = sock; |
| s->role = req->role; |
| s->state = BT_CONNECTED; |
| s->flags = req->flags; |
| |
| s->msg.msg_flags = MSG_NOSIGNAL; |
| |
| #ifdef CONFIG_BT_BNEP_MC_FILTER |
| /* Set default mc filter to not filter out any mc addresses |
| * as defined in the BNEP specification (revision 0.95a) |
| * http://grouper.ieee.org/groups/802/15/Bluetooth/BNEP.pdf |
| */ |
| s->mc_filter = ~0LL; |
| #endif |
| |
| #ifdef CONFIG_BT_BNEP_PROTO_FILTER |
| /* Set default protocol filter */ |
| bnep_set_default_proto_filter(s); |
| #endif |
| |
| SET_NETDEV_DEV(dev, bnep_get_device(s)); |
| SET_NETDEV_DEVTYPE(dev, &bnep_type); |
| |
| err = register_netdev(dev); |
| if (err) |
| goto failed; |
| |
| __bnep_link_session(s); |
| |
| __module_get(THIS_MODULE); |
| s->task = kthread_run(bnep_session, s, "kbnepd %s", dev->name); |
| if (IS_ERR(s->task)) { |
| /* Session thread start failed, gotta cleanup. */ |
| module_put(THIS_MODULE); |
| unregister_netdev(dev); |
| __bnep_unlink_session(s); |
| err = PTR_ERR(s->task); |
| goto failed; |
| } |
| |
| up_write(&bnep_session_sem); |
| strcpy(req->device, dev->name); |
| return 0; |
| |
| failed: |
| up_write(&bnep_session_sem); |
| free_netdev(dev); |
| return err; |
| } |
| |
| int bnep_del_connection(struct bnep_conndel_req *req) |
| { |
| u32 valid_flags = 0; |
| struct bnep_session *s; |
| int err = 0; |
| |
| BT_DBG(""); |
| |
| if (req->flags & ~valid_flags) |
| return -EINVAL; |
| |
| down_read(&bnep_session_sem); |
| |
| s = __bnep_get_session(req->dst); |
| if (s) { |
| atomic_inc(&s->terminate); |
| wake_up_interruptible(sk_sleep(s->sock->sk)); |
| } else |
| err = -ENOENT; |
| |
| up_read(&bnep_session_sem); |
| return err; |
| } |
| |
| static void __bnep_copy_ci(struct bnep_conninfo *ci, struct bnep_session *s) |
| { |
| u32 valid_flags = BIT(BNEP_SETUP_RESPONSE); |
| |
| memset(ci, 0, sizeof(*ci)); |
| memcpy(ci->dst, s->eh.h_source, ETH_ALEN); |
| strcpy(ci->device, s->dev->name); |
| ci->flags = s->flags & valid_flags; |
| ci->state = s->state; |
| ci->role = s->role; |
| } |
| |
| int bnep_get_connlist(struct bnep_connlist_req *req) |
| { |
| struct bnep_session *s; |
| int err = 0, n = 0; |
| |
| down_read(&bnep_session_sem); |
| |
| list_for_each_entry(s, &bnep_session_list, list) { |
| struct bnep_conninfo ci; |
| |
| __bnep_copy_ci(&ci, s); |
| |
| if (copy_to_user(req->ci, &ci, sizeof(ci))) { |
| err = -EFAULT; |
| break; |
| } |
| |
| if (++n >= req->cnum) |
| break; |
| |
| req->ci++; |
| } |
| req->cnum = n; |
| |
| up_read(&bnep_session_sem); |
| return err; |
| } |
| |
| int bnep_get_conninfo(struct bnep_conninfo *ci) |
| { |
| struct bnep_session *s; |
| int err = 0; |
| |
| down_read(&bnep_session_sem); |
| |
| s = __bnep_get_session(ci->dst); |
| if (s) |
| __bnep_copy_ci(ci, s); |
| else |
| err = -ENOENT; |
| |
| up_read(&bnep_session_sem); |
| return err; |
| } |
| |
| static int __init bnep_init(void) |
| { |
| char flt[50] = ""; |
| |
| #ifdef CONFIG_BT_BNEP_PROTO_FILTER |
| strcat(flt, "protocol "); |
| #endif |
| |
| #ifdef CONFIG_BT_BNEP_MC_FILTER |
| strcat(flt, "multicast"); |
| #endif |
| |
| BT_INFO("BNEP (Ethernet Emulation) ver %s", VERSION); |
| if (flt[0]) |
| BT_INFO("BNEP filters: %s", flt); |
| |
| bnep_sock_init(); |
| return 0; |
| } |
| |
| static void __exit bnep_exit(void) |
| { |
| bnep_sock_cleanup(); |
| } |
| |
| module_init(bnep_init); |
| module_exit(bnep_exit); |
| |
| module_param(compress_src, bool, 0644); |
| MODULE_PARM_DESC(compress_src, "Compress sources headers"); |
| |
| module_param(compress_dst, bool, 0644); |
| MODULE_PARM_DESC(compress_dst, "Compress destination headers"); |
| |
| MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>"); |
| MODULE_DESCRIPTION("Bluetooth BNEP ver " VERSION); |
| MODULE_VERSION(VERSION); |
| MODULE_LICENSE("GPL"); |
| MODULE_ALIAS("bt-proto-4"); |